Hackers reportedly stole $250,000 from Bangladesh's Sonali Bank in 2013, in what's now the fourth case involving malware attacks and injecting fraudulent money-transfer requests into the SWIFT interbank messaging network.
After blaming a recent spate of bank robberies on banks' poor information security practices, SWIFT has changed its tune. Now it says it wants to help financial firms spot related fraud and better share information about unfolding threats.
The Swiss government says that online attackers used a variant of "Turla" malware - previously tied to campaigns with suspected Russian intelligence ties - to steal at least 23 GB of sensitive information from state-owned defense firm RUAG.
After Kansas Heart Hospital suffered a ransomware infection and paid the demanded ransom, its attackers demanded more. At that point, the hospital reportedly declined to comply, relying instead on its pre-prepared backup and recovery plan.
Too few organizations have in-house incident response teams. As a result, they lack the native ability to even detect evolving threats, such as ransomware, says Ann Barron-DiCamillo of Strategic Cyber Ventures in this video interview. What are the must-have response capabilities?
Officials in several nations are probing the security of the SWIFT interbank messaging system in the wake of recent hacker attacks. Can the bank-owned cooperative better police members, secure access to its network as well as spot emerging hack attacks and fraud?
Banks and regulators have begun reviewing SWIFT-related information security practices and requirements following the online heist of $81 million from Bangladesh Bank. Authorities say much of that money is still missing.
In a shocking twist, the developers behind the TelsaCrypt ransomware have apologized for their ransom campaign and released a master decryption key, which all victims can now use to unlock the malware.
In today's rapidly changing cyber threat environment, the federal government needs to take a lead role in making sure mobile device security is adequate, says security researcher Stephen Cobb, who analyzes ongoing investigations by the FTC and FCC in this audio interview.
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Tavis Ormandy of Google's Project Zero found he could hack Symantec's security products with a single email. The flaw has been fixed, but the finding is a reminder that flaws in anti-virus software can leave users at serious risk from hackers.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
Vietnam's TPBank says it successfully foiled more than $1 million in fraudulent transfer requests apparently initiated by the same hackers who targeted Bangladesh Bank and other SWIFT-using institutions with PDF reader malware.
Law enforcement agencies have scored some notable botnet-busting successes, disrupting malicious infrastructure and arresting botnet-using gangs. But cybercriminals are adapting, one top EU cybercrime investigator warns.